𝔖 Scriptorium
✦   LIBER   ✦

📁

Advances on Intelligent Informatics and Computing: Health Informatics, Intelligent Systems, Data Science and Smart Computing (Lecture Notes on Data Engineering and Communications Technologies, 127)

✍ Scribed by Faisal Saeed (editor), Fathey Mohammed (editor), Fuad Ghaleb (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
793
Edition
1st ed. 2022
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book presents emerging trends in intelligent computing and informatics. This book presents the papers included in the proceedings of the 6th International Conference of Reliable Information and Communication Technology 2021 (IRICT 2021) that was held virtually, on Dec. 22-23, 2021. The main theme of the book is “Advances on Intelligent Informatics and Computing”. A total of 87 papers were submitted to the conference, but only 66 papers were accepted and published in this book. The book presents several hot research topics which include health informatics, artificial intelligence, soft computing, data science, big data analytics, Internet of Things (IoT), intelligent communication systems, cybersecurity, and information systems.

✦ Table of Contents


Preface
Organization
IRICT 2021 Organizing Committee
International Advisory Board
Conference General Chair
Program Committee Chair
General Secretary
Technical Committee Chair
Publications Committee
Publicity Committee
IT & Multimedia Committee
Treasure Registration Committee Chair
International Technical Committee
Contents
Artificial Intelligence
Automatic Saudi Arabian License Plate Detection and Recognition Using Deep Convolutional Neural Networks
1 Introduction
2 Related Works
3 Proposed Approach
3.1 License Plate Detection Phase
3.2 Image Pre-processing Phase
3.3 Character Segmentation and Recognition Phase
4 Implementation and Experiments
4.1 Dataset Collection and Labeling
4.2 Faster-RCNN-Based LP Detection
4.3 Image Preprocessing
4.4 LP Segmentation and Recognition
5 Conclusion and Future Work
References
Ship Detection Approach Using Machine Learning Algorithms
1 Introduction
2 Background and Related Work
3 Proposed Methodology
4 Results and Discussion
4.1 Dataset
4.2 Results
5 Conclusions
References
A New Deep Learning System for Wild Plants Classification and Species Identification: Using Leaves and Fruits
1 Introduction
2 Review of Related Literatures
3 Description of the Implemented Techniques
4 Empirical Studies
4.1 Description of Dataset
4.2 Dataset Analysis
4.3 Feature’s Extraction
5 Proposed Models and Results
5.1 Families Classification (Binary Classification)
5.2 Species Identification (Categorical Classification)
6 Conclusion and Recommendation for the Future Work
References
A Novel Weighted Fractional TDGM Model and Quantum Particle Swarm Optimization Algorithm for Carbon Dioxide Emissions Forecasting
1 Introduction
2 Materials and Methods
2.1 The Weighted Fractional Accumulation Generating Operator and Their Inverse
2.2 The Weighted of Fractional-Order of TDGM Model
2.3 Quantum Particle Swarm Optimization Algorithm Weighted of Fractional-Order of WFGM Model
3 Experiment Results
4 Conclusions
References
Text Detergent: The Systematic Combination of Text Pre-processing Techniques for Social Media Sentiment Analysis
1 Introduction
2 Related Work
3 Methodology
3.1 Phase 1
3.2 Phase 2
3.3 Phase 3
4 Results
4.1 Phase 4
5 Discussion
6 Conclusion
References
Improve Short-term Electricity Consumption Forecasting Using a GA-Based Weighted Fractional Grey Model
1 Introduction
2 The Weighted Fractional Accumulated Generating Matrices and Their Inverse Matrices
3 The Weighted of Fractional-Order Grey Model
4 Genetic Algorithm for Determining the Optimal Value of Fractional Order of WFGM Model
5 Experiment Results
5.1 Performance Measures
5.2 Obtained Results and Comparison
6 Conclusion
References
Efficient Human Activity Recognition System Using Long Short-Term Memory
1 Introduction
2 Related Work
3 Data Acquisition
4 Pre-processing
5 Architecture
6 Results
7 Conclusions
References
Job Training Recommendation System: Integrated Fuzzy AHP and TOPSIS Approach
1 Introduction
2 Research Method
3 Results and Discussion
3.1 Criteria and Sub-criteria Analysis
3.2 Criteria and Sub-criteria Analysis
3.3 Criteria and Sub-criteria Analysis
4 Conclusion
References
Improvement of Population Diversity of Meta-heuristics Algorithm Using Chaotic Map
1 Introduction
2 Review of Literature
2.1 Particle Swarm Optimization (PSO)
2.2 Inertia Weight
2.3 Chaotic Logistic Map
3 Methodology
4 Result and Discussion
4.1 Comparison of NFE, Mean Fitness Value and Standard Deviation for Proposed CHPSO and Other Algorithms
5 Conclusion
References
Adaptive and Global Approaches Based Feature Selection for Large-Scale Hierarchical Text Classification
1 Introduction
2 Literature Review
2.1 Hierarchical Classification (HC)
2.2 Dimensional Reduction (DR)
2.3 Feature Selection Approaches
3 Material and Methods
3.1 Hierarchical Classification Method
3.2 Information Gain Method
3.3 Chi-square Method
3.4 Adaptive and Global Approaches
4 Dataset and Experiment Settings
5 Results Analysis
6 Conclusion
References
Ensemble Method for Online Sentiment Classification Using Drift Detection-Based Adaptive Window Method
1 Introduction
2 Related Works
3 Proposed Ensemble Method for Sentiment Classification Using DDAW
3.1 Drift Detection Component
3.2 Ensemble Method for Sentiment Classification Using DDAW
4 Experimental Results and Discussions
4.1 Performance of the Different DDAW Versions
4.2 Performance Comparison with Existing Methods
5 Conclusion
References
Rainfall Forecasting Using the Group Method of Data Handling Model: A Case Study of Sarawak, Malaysia
1 Introduction
2 The Group Method of Data Handling Model
3 Methods
3.1 Dataset
3.2 Experimental Results
4 Conclusion
References
Detecting Public Outlook Towards Vaccination Using Machine Learning Approaches: A Systematic Review
1 Introduction
2 Theoretical Background
3 Systematic Review
3.1 Machine Learning Models
3.2 Deep Learning Models
3.3 Ensemble Learning Models
4 Systematic Review Results
5 Conclusion
References
Forecasting Carbon Dioxide Emission for Malaysia Using Fractional Order Multivariable Grey Model
1 Introduction
2 Methodology
2.1 Fractional Order Multivariable Grey, FAGM (1,N) Model
2.2 Forecast Accuracy Measurement
2.3 Conceptual Framework
3 Result and Discussion
4 Conclusion
References
A Hybrid Algorithm for Pattern Matching: An Integration of Berry-Ravindran and Raita Algorithms
1 Introduction
1.1 Problem Statement
2 Related Studies
3 Materials and Methods
3.1 Hybrid Algorithm Pre-processing Phase
3.2 Hybrid Algorithm Searching Phase
4 Analysis
4.1 Lemma 1: The Worst-Case Scenario with Respect to Time Complexity is Defined as O(Mn).
4.2 Lemma 2: The Best-Case Scenario with Respect to Time Complexity is O(N/(M + 2)).
4.3 Evaluation
5 Results
6 Discussion
7 Conclusion
References
A Survey of the Hybrid Exact String Matching Algorithms
1 Introduction
2 String Matching Algorithms
2.1 Exact String Matching Algorithm
2.2 Approximate String Matching Algorithm
3 Evaluation Approaches
4 Review on Hybrid Algorithms
4.1 Berry-Ravindran Hybrid Algorithm
4.2 SSABS Hybrid Algorithm
4.3 FJS Hybrid Algorithm
4.4 TVSBS Hybrid Algorithm
4.5 BMBR Hybrid Algorithm
4.6 ZTBMH Hybrid Algorithm
4.7 BRFS Hybrid Algorithm
4.8 BRBMH Hybrid Algorithm
4.9 BRQS Hybrid Algorithm
4.10 ZTFS Hybrid Algorithm
4.11 RSMA-BR Hybrid Algorithm
4.12 ShiftAndBMS Hybrid Algorithm
4.13 BRSS Hybrid Algorithm
4.14 BHAC Hybrid Algorithm
4.15 KMPBS Hybrid Algorithm
5 Discussion
6 Conclusion
References
Data Science
C-SAR: Class-Specific and Adaptive Recognition for Arabic Handwritten Cheques
1 Introduction
2 Related Work
3 Adaptive Recognition for Arabic Handwritten Cheques
3.1 Angular Feature Extraction Method
3.2 Arabic Numbers
3.3 Class-Specific Taxonomy of Arabic Cheque Words
3.4 Machine Learning Models
4 Experiment Results
5 Conclusion
Appendix A
Appendix B
Appendix C
References
Extraction of Spatiotemporal Association Rules for Forest Fires Prediction
1 Introduction
2 Spatiotemporal Association Rule
3 Extraction of Spatiotemporal Association Rules Process
3.1 Pretreatment
3.2 Algorithm and Interest Measures Used
3.3 Post-treatment
4 Experimental Design
5 Association Rules Obtained and Interpretation
6 Conclusion
References
Opinion Mining Using Topic Modeling: A Case Study of Firoozeh Dumas’s Funny in Farsiin Goodreads
1 Introduction
2 Literature Review
2.1 Social Media Mining
2.2 Topic Modelling
3 Methodology and Materials
4 Results
4.1 Text Normalization
4.2 Text Visualization
4.3 Topic Modeling
5 Discussion and Conclusion
References
Opinion Mining Using Sentiment Analysis: A Case Study of Readers’ Response on Long Litt Woon’s The Way Through the Woodsin Goodreads
1 Introduction
2 Literature Review
2.1 Social Media and Opinion Mining
2.2 Sentiment Analysis
3 Methodology and Materials
4 Analysis and Results
4.1 Text Exploration and Visualization
4.2 Sentiment Analysis Results Using VADER and TextBlob
5 Discussion
6 Conclusion
References
Opinion Mining of Readers’ Responses to Literary Prize Nominees on Twitter: A Case Study of Public Reaction to the Booker Prize (2018–2020)
1 Introduction
2 Literature Review
2.1 Topic Modelling
2.2 Sentiment Analysis
2.3 Clustering
3 Materials and Methodology
4 Results and Discussion
4.1 Topic Modelling
4.2 Sentiment Analysis
4.3 Clustering
5 Conclusion
References
Dictionary-Based DGAs Variants Detection
1 Introduction
2 Related Works
3 Methodology
3.1 Dictionary-Based DGAs
3.2 Extracted Features
3.3 Data Sets and Classifiers
3.4 Feature Selection
4 Results and Discussion
5 Conclusion
References
Comparison of Unsupervised Machine Learning Analysis Using K-Means, Hierarchical Clustering, and Principal Component Analysis in Horticulture Agribusiness: Shallot and Tomato Productivity in Indonesia
1 Introduction
2 Methods
2.1 Data
2.2 Clustering Methods
2.3 Principal Component Analysis (PCA)
2.4 Experimental Design
3 Results and Discussion
4 Conclusion
References
Arabic Auto-CON: Automated Arabic ConcordancerConstruction from Arabic Corpus
1 Introduction
2 Related Work
3 Material and Method
3.1 Arabic Auto-CON
3.2 Implementation Process
3.3 Implementation of Auto-CON
3.4 Finding Concordance
3.5 The GUI of Auto-CON Tool
3.6 The Evaluation of the Tool
4 Conclusion and Future Work
References
Sentiment Analysis of Restaurants Customer Reviews on Twitter
1 Introduction
2 Related Works
3 Proposed Approach
3.1 The PLSD Lexicon Creation
3.2 The ELSA Lexicon Creation
3.3 The Customers’ Reviews Dataset Collection
4 Experimental Results
5 Conclusion
References
An Analysis of Students’ Academic Performance Using K-Means Clustering Algorithm
1 Introduction
2 Literature Review
2.1 Background
2.2 Related Work
3 Methodology
4 Results and Analysis
4.1 Clustering Analysis of Students’ Data During Covid-19
5 Conclusion
References
The Effect of Kernel Functions on Cryptocurrency Prediction Using Support Vector Machines
1 Introduction
2 Literature Review
3 Literature Review
3.1 Nonlinear Support Vector Machine
3.2 Methodology: SVM Parameter Selection and Hyperparameter Tuning
4 Results and Discussion
5 Conclusion
References
Comparative Study of Service-Based Sentiment Analysis of Social Networking Sites Fanatical Contents
1 Introduction
2 Related Work
2.1 Fanatical Contents Sentiment Analysis
2.2 Web Service-Based Sentiment Analysis
3 Methodology
3.1 Data Collection
3.2 Data Pre-processing
3.3 Service-Based Sentiment Analysis
3.4 Performance Evaluation of the Mobile Web Services
4 Results and Discussions
5 Conclusion and Future Work
References
Networking and IoT
An Overview on LoRaWAN Technology Simulation Tools
1 Introduction
2 LoRal/LoRaWAN
3 LoRa/LoraWAN Simulator Tools
3.1 LoRaSim
3.2 Ns-3
3.3 FloRa
3.4 CupCarbon
3.5 PhySimulator
3.6 SimpleIoTSimulator
3.7 Arm Mbed OS Simulator
4 Discussion
5 Conclusions
References
Applying a Lightweight ECC Encryption in Multi-topology Sensor Networks to Enhance Intelligent IoT Low-Cost Transportation Platforms Security Based on CoAP Constrained Protocol
1 Introduction
2 Intelligent Transport Construction and Goals
3 Methodology
4 Related Works
5 The Proposed Approach
6 Discussion and Results
7 Conclusion and Perspectives
References
A Review on 5G Technology in IoT-Application Based on Light Fidelity (Li-Fi) Indoor Communication
1 Introduction
2 5G Concepts
2.1 5G Internet Key Features
2.2 Architecture of 5G Network
2.3 Implementation of 5G Towards User Devices
2.4 IoT as Part of 5G Network Wireless Technology
3 Analysis of Li-Fi in 5G Based on IoT
3.1 Li-Fi Network Technology
3.2 Comparative Analysis between Wi-Fi and Li-Fi
3.3 The Integration of Li-Fi Technologies into 5G and IoT
4 Issues and Challenges
4.1 5G Wireless Initial Issues
4.2 Challenges Faced by IoT
4.3 Limitation Toward Li-Fi
5 Conclusion
References
Effect of Optimal Placement of Shunt Facts Devices on Transmission Network Using Firefly Algorithm for Voltage Profile Improvement and Loss Minimization
1 Introduction
2 STATCOM Structure and Operation Mode
3 SVC Structure and Operation Mode
4 Problem Formulation
4.1 Load Flow Analysis
4.2 Objective Function
4.3 Firefly Algorithm
5 Results and Discussion
5.1 Voltage Profile Improvement with Firefly Algorithm Placed SVC and STATCOM
5.2 Effect of Firefly Algorithm Placed SVC and STATCOM on Active Power Loss
5.3 Effect of Firefly Algorithm Placed SVC and STATCOM on Reactive Power Loss
6 Conclusion
References
Efficient and Secure Topology Discovery in SDN: Review
1 Introduction
2 Overview of SDN Architecture
2.1 Infrastructure Layer
2.2 Control Layer
2.3 Application Layer
2.4 Southbound API
2.5 Northbound API
3 Topology Discovery in SDN
3.1 Switch Discovery
3.2 Host Discovery
3.3 Link Discovery
4 State-of-the-Art Studies in Link Discovery Topology
5 Challenges and Future Directions
5.1 Standard Evaluation Metrics
5.2 Need for Standardized Protocol
5.3 Secured Cryptography Development
5.4 Hybrid Parameters Formation
6 Conclusion
References
The Good, the Bad, and the Ugly: Review on the Social Impacts of Unmanned Aerial Vehicles (UAVs)
1 Introduction
2 The UAV Era
3 The Good of UAVs
4 The Bad of UAVs
5 The Ugly of UAVs
6 Discussion
7 Conclusion and Future Work
References
Big Data Analytics for Large Scale Wireless Body Area Networks; Challenges, and Applications
1 Introduction
2 Big Data Analytics
2.1 Characteristics of Big Data Analytics
2.2 Methods of Analytics
3 Large Scale WBAN
3.1 Routing Protocols
3.2 Applications
4 Implementing Big Data Analytics for Large Scale WBAN
4.1 Benefits of Big Data Analytics in WBAN
4.2 Implementation Challenges
4.3 Application of Big data Analytics in Large Scale WBAN
5 Conclusion
References
A Review of the Role of Latency in Multi-controller Placement in Software-Defined-Wide Area Networks
1 Introduction
1.1 Software-Defined Networking (SDN)
1.2 Distributed Controller Architecture
1.3 The Capacitated/Uncapacitated Controller
2 Related Works
2.1 Multi-latency Objectives
2.2 Multi-latency with Other Functional Objectives
3 Conclusion
References
Factors Influencing the Security of Internet of Things Systems
1 Introduction
2 Literature Review
3 Methods
3.1 Data Collection
3.2 Data Analysis
4 Findings
4.1 Lack of IoT Standards
4.2 Heterogeneity
4.3 Vulnerability
4.4 Resource Constraints
4.5 Trust
4.6 Pervasiveness
4.7 Manufacturing
5 Discussion
6 Conclusions
References
Cyber Security
Facilitate Security Event Monitoring and Logging of Operational Technology (OT) Legacy Systems
1 Introduction
2 Related Works
2.1 The Industrial Control System (ICS)
3 Methodology
3.1 The Integrated Architectural Tool
4 Security Logging and Monitoring in the ICS Ecosystem
4.1 Determine What to Monitor
4.2 ICS Cybersecurity Challenges
5 ICS Logging and Monitoring Visualised Architecture
6 Case Study Scenario
7 Conclusion
References
Validating Mobile Forensic Metamodel Using Tracing Method
1 Introduction
2 Related Works
3 Methodology
3.1 Stage I: Select Validation Technique
3.2 Stage II: Conduct Validation
4 Discussion and Analysis
5 Conclusion
References
Catching a Phish: Frontiers of Deep Learning-Based Anticipating Detection Engines
1 Introduction
2 Zero-Hour Phishing Detection
3 Conceptual Background of Deep Learning
4 Frontiers of Deep Learning-Based Phishing Detection
5 Conclusions
Appendix
References
Applying an Enhanced Elliptic Curve Integrated Encryption Scheme ECIES to Enhance Smart Energy IoT Platform Security Based on Constrained Protocol
1 Introduction
2 Smart Grid IoT Platform and Aims
3 Methodology
4 Related Works
5 The Proposed Approach
6 Discussion and Results
7 Conclusion and Perspectives
References
Applying Lightweight Elliptic Curve Cryptography ECC and Advanced IoT Network Topologies to Optimize COVID-19 Sanitary Passport Platforms Based on Constrained Application Protocol
1 Introduction
2 Related Works
3 Functional Medical IoT Scenarios
4 The Proposed Approach
5 Discussion and Results
6 Conclusion and Perspectives
References
Challenges on Digital Cyber-Security and Network Forensics: A Survey
1 Introduction
2 Digital Cyber-Security and Network Forensics Methods
3 Digital Cyber-Security Model
4 Cybercrime Investigation Process
5 Conclusion
References
Information Systems
A Model of Trusted Factors of Video Word of Mouth (vWOM) in Social Commerce
1 Introduction
2 Literature Review
2.1 Video Word of Mouth (vWOM)
2.2 Research Related Video Word of Mouth (vWOM)
2.3 Rhetoric Theory
3 Research Methodology
4 Findings
4.1 Trusted Factors of Video Word of Mouth (vWOM)
4.2 Trusted Video Word of Mouth (vWOM) Model
5 Conclusion
References
Information Quality Requirements for a Nutrition App Based on Experts Interviews
1 Introduction
2 Information Quality for Online Health Information
3 Methodology
3.1 The Objective of the Interview
3.2 Selection of Experts
3.3 Data Collection and Analysis
4 Results
4.1 Stakeholders and Roles
4.2 Types of Information
4.3 Information Quality Requirements
5 Discussion
6 Conclusion
References
Design of Test Data Generation Method for Dynamic- Functional Testing in Automatic Programming Assessment Using Flower Pollination Algorithm
1 Introduction
2 Related Work
3 Methodology
4 Design of DyFunFPA-TDG Method
4.1 Criteria of Deriving Test Set
4.2 Flower Pollination Algorithm
4.3 Flower Pollination Algorithm (FPA) in DyFunFPA-TDG
5 DyFunFPA-TDG Method by Example
6 Conclusion
References
A Comparative Evaluation on Methods of Teaching Computer Programming
1 Background
2 Methods of Teaching Programming and Its Fundamental Concepts
2.1 Visualization
2.2 Game-Based Learning
2.3 Robotics
2.4 Problem-Solving
2.5 Simulation
2.6 Code Tracing
2.7 Pair Programming
3 Methodology
3.1 A Theoretical Study
3.2 Comparative Evaluation
3.3 Conclusion and Suggestion
4 Analysis and Result of Comparative Evaluation
5 Conclusion
References
Attitude Towards Intention to Use Mobile-Based Teaching Assessment Based on TAM and a Novel Extended TAM Model
1 Introduction
2 Background and Related Work
2.1 Assessments on the Basis of Mobile Technology
2.2 Technology Acceptance Model
2.3 Research Model and Hypothesis
3 Proposed Methodology
3.1 Participants
3.2 Procedure and Instrument
4 Data Analysis
5 Discussion
6 Conclusions
References
The Roles of Information Presentation on User Performance in Mobile Augmented Reality Application
1 Introduction
2 Related Work
2.1 Mobile Augmented Reality
2.2 Information Presentation Theory
2.3 Information Presentation in Mobile AR
2.4 Multimodal Information Presentation
3 Method
3.1 Experimental Procedures
3.2 Data Collection
3.3 Data Analysis
3.4 Mobile AR Apps
4 Results
4.1 Results from QUIS for First Condition
4.2 Results from QUIS for Second Condition
4.3 Comparison Analysis Between First Condition and Second Condition
5 Discussion
5.1 Implementation Concerns for Information Presentation in Mobile AR
6 Conclusion
References
Relevance Judgment of Argument Quality and Online Review Adoption During Information Search in e-Commerce Review Platform
1 Introduction
2 Theoretical Background and Model Development
2.1 Factors Derivations
2.2 Research Hypothesis
3 Research Method
3.1 Data Collection
4 Research Result
4.1 Assessment of Measurement Model
4.2 Assessment of Structural Model
5 Discussion and Conclusions
5.1 Practical Contribution
5.2 Theoretical Contribution
References
An Exploratory Study on the Use of Social Companion Robot for Adults with Motor Disabilities
1 Introduction
2 Related Work
2.1 Disabled People and Assistive Technologies
2.2 Zenbo Robot as the Assistive Technology for Disabled People
3 The Preliminary Study
4 Methodology
4.1 Participants
4.2 Setting
4.3 Materials
5 Results and Discussions
5.1 Time Taken to Complete the Task
5.2 Task Success Rate
5.3 Zenbo’s Design and Capabilities
5.4 Acceptability of Zenbo as Companion
5.5 Solution Effectiveness
6 Conclusion
References
A Comparison of Block-Based Programming Platforms for Learning Programming and Creating Simple Application
1 Introduction
2 Block-Based Programming Platforms
3 Analysis and Comparison Result
4 Conclusion
References
Information Security Policy Compliance: An Exploration of User Behaviour and Organizational Factors
1 Introduction
2 Literature Review
3 Method
4 Result
5 Discussion
6 Conclusion
References
Understanding Wearable Device Adoption: Review on Adoption Factors and Directions for Further Research in Smart Healthcare
1 Introduction
2 Background
2.1 Wearable Devices: An Overview
2.2 Research in Wearable Device Adoption
3 Research Methodology
4 Trustworthiness in IoT Adoption
5 Previous Study on Trustworthiness
6 Trustworthiness in Blood Glucose Monitoring
7 Research Questions Outcomes
8 Discussion
9 Conclusion
References
Factors Contributing to an Effective E- Government Adoption in Palestine
1 Introduction
2 Literature Review
3 Conceptual Model
4 Research Method
5 Data Analysis
5.1 Structural Model
6 Discussion
7 Conclusion
8 Limitations and Future Studies
References
Preliminary Investigation on Malaysian Office Workers’ Sedentary Behaviour, Health Consequences, and Intervention Preferences: Towards Designing Anti Sedentary Behaviour Change Support Systems
1 Introduction
1.1 Workplace Sedentary Behaviour
2 Methodology
2.1 Respondents
2.2 Questionnaire
3 Results and Analysis
3.1 Demographic Profile
3.2 Occupational Sitting Patterns
3.3 Knowledge on Sedentary Behaviour
3.4 Intervention Preferences
4 Discussion
5 Conclusion
6 Ethical Approval
References
The National Industry 4.0 Policy Performance Review Based on Industry4WRD Readiness Assessment and Intervention Program
1 Introduction of National Industry 4.0 Policy: Industry4WRD Program
1.1 The Initiation of Industry4WRD Program
1.2 The Industry4WRD Readiness Assessment and Profile
2 The Participation of Industry4WRD
2.1 The Industry4WRD Demographic of Participation by State
2.2 The Industry4WRD Demographic of Participation by Manufacturing Sectors
3 The Industry4WRD Performance
3.1 The Industry4WRD RA Profile
4 The Conclusion and Recommendations
References
Construction 4.0 Readiness and Challenges for Construction Skills Training Institutions in Malaysia
1 Research Background
1.1 Introduction
1.2 Issue Statement
1.3 Research Purpose
1.4 Research Objectives and Questions
1.5 Research Framework
1.6 Research Limitation
2 Literature Review
2.1 Industry 4.0
2.2 The New Technologies
2.3 Construction 4.0
2.4 Construction 4.0 Strategic Plan (2021–2025)
2.5 Construction Skills Training Institutions in Malaysia
2.6 Research Significance
References
A Conceptual Framework for Democratization of Big Data Analytics (BDA)
1 Introduction
2 Problem Statement
3 Literature Review
3.1 Big Data and Big Data Analytics
3.2 Democratization Definition from Previous Work
3.3 The Importance of Technology Democratization
4 Theoretical Framework
4.1 Technological Organizational Environmental (TOE) and Stakeholder Theories
4.2 B. Definition of the Stakeholders?
4.3 The Proposed Conceptual Framework
5 Conclusion
References
Construction 4.0 Intervention in Quality Assessment System in Construction’s Implementation
1 Research Background
1.1 Introduction
1.2 Issue Statement
1.3 Research Purpose
1.4 Research Objectives and Questions
1.5 Research Framework
1.6 Research Limitation
2 Literature Review
2.1 Overview of Malaysia Construction Industry
2.2 Quality Assessment System in Construction (QLASSIC)
2.3 Construction 4.0 in Malaysia Landscape
3 Conclusion
References
Gamification Elements in E-Library Services in Higher Education: A Systematic Review
1 Introduction
2 Literature Review
2.1 E-Libraries
2.2 Gamification
2.3 Gamification in e-library Services
3 Methodology
3.1 Research Design
3.2 Database Search
3.3 Selection Criteria
3.4 Data Extraction
4 Results and Discussion
4.1 Results
4.2 Discussion
5 Conclusion
References
Health Informatics
Bayesian Model for Detecting Influence Directionality of Heart Related Diseases with Application in Multimorbidity Understanding
1 Introduction
2 Related Works
3 Data and Methods
3.1 Problem Setting
3.2 Building Comorbidity Disease Network Algorithm
3.3 Data
3.4 Evaluation Metrics
4 Results and Discussion
5 Conclusion and Perspectives
References
Data Science for Multimorbidity Modeling: Can Age and Sex Predict Multimorbidity Burden?
1 Introduction
2 Data and Methods
2.1 Problem Setting
2.2 Hypothesis Space H
2.3 Evaluation Metrics
2.4 Data
3 Results and Discussion
3.1 Gender and k-morbidity Variables
3.2 Modeling Relationship of Age and Gender to Multimorbidity
3.3 Age Relation to Multimorbidity Modeling
4 Conclusion
References
Advanced Analytics for Medical Supply Chain Resilience in Healthcare Systems: An Infection Disease Case
1 Introduction
2 Impacts of Infectious Diseases in the Medical Supply Chain
3 Proposed Framework
3.1 Epidemiology Curve Prediction
3.2 Optimal Design, Operation and Control of the Medical Supply Chain
3.3 Sensitivity Analysis for Social Progress and Sustainable Economy
4 Conclusion
References
Application of Temporal Network on Potential Disease Transmission: Hospital Case Study
1 Introduction
2 Related Work
3 Methodology
4 Results
4.1 The Topological Analysis
4.2 Dynamic Simulation of the SIR Model
4.3 Disease Transmission Analysis
5 Results
6 Conclusion
References
Hospital Supply Chain Management and Quality of Services Within Hospitals: A Preliminary Review
1 Introduction
2 Business Model
3 Literature Review
3.1 HealthCare Quality Service
3.2 Supply Chain
4 Methodology
5 Discussion
6 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Advances in Intelligent Systems, Compute
✍ Zhengbing Hu (editor), Sergei Gavriushin (editor), Sergey Petoukhov (editor), Ma 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>The book comprises high-quality refereed research papers presented at the Third International Symposium on Computer Science, Digital Economy, and Intelligent Systems (CSDEIS2021), held in Moscow, Russia, on December 25-26, 2021, organized jointly by the Mechanical Engineering Research Insti

Proceedings of the International Confere
✍ Aboul Ella Hassanien (editor), Václav Snášel (editor), Kuo-Chi Chang (editor), A 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This proceeding book constitutes the refereed proceedings of the 7th International Conference on Advanced Intelligent Systems and Informatics (AISI 2021), which took place in Cairo, Egypt, during December 11-13, 2021, and is an international interdisciplinary conference that presents a spec

Advances in Intelligent Systems, Compute
✍ Zhengbing Hu (editor), Yong Wang (editor), Matthew He (editor) 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>This book comprises high-quality peer-reviewed research papers presented at the 4th International Symposium on Computer Science, Digital Economy and Intelligent Systems (CSDEIS2022), held in Wuhan, China, from November 11–13, 2022, organized jointly by the Wuhan University of Technology, Hu

Innovative Systems for Intelligent Healt
✍ Faisal Saeed, Fathey Mohammed, Abdulaziz Al-Nahari 📂 Library 📅 2021 🏛 Springer 🌐 English

This book presents the papers included in the proceedings of the 5th International Conference of Reliable Information and Communication Technology 2020 (IRICT 2020) that was held virtually on December 21–22, 2020. The main theme of the book is “Innovative Systems for Intelligent Health Informatics”.

Proceedings of the 9th International Con
✍ AboulElla Hassanien (editor), Rawya Y. Rizk (editor), Dragan Pamucar (editor), A 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>This proceedings book constitutes the refereed proceedings of the 9th International Conference on Advanced Intelligent Systems and Informatics (AISI 2023), which took place in Port Said University, Port Said, Egypt, during September 20–22, 2023, Egypt, and is an international interdisciplin

Mobile Computing and Sustainable Informa
✍ Subarna Shakya (editor), Klimis Ntalianis (editor), Khaled A. Kamel (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book gathers selected high-quality research papers presented at International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2022) organized by Pulchowk Campus, Institute of Engineering, Tribhuvan University, Nepal, during 27–28 January 2022. The book discusses rece